OilRig Hides C2 Config in Google Drive Image via LSB Steganography
APT-C-49 (OilRig), an Iranian state-sponsored advanced persistent threat group also known as APT34 and Helix Kitten, has deployed a sophisticated new attack campaign that conceals command-and-control configurations inside Google Drive images using LSB steganography. The group, which has been active
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · IR
- [HEALTH] In the name of immunity, for the sake of the sacred: An analysis of the Iranian government's response to the COVID-19 ou
- [CONFLICT] Iran war begins to hit China’s economy as costs surge
- [CONFLICT] Mossad head Barnea highlights operational capabilities, strategic success against Iran, Hezbollah
- [CONFLICT] US no longer in position to dictate other nations’ policy — Iran
- [DIPLOMACY] Araghchi visit highlights Iran-Russia coordination during US-Iran conflict tensions - analysis
- [DIPLOMACY] Gökyüzünde komplo teorisi! Yağmurlarımız çalındı mı? Bilim şöyle diyor...